> While I'm not disputing that you've created a reasonably strong
> passphrase, my original point was that any passphrase that isn't fully
> random has a reduced keyspace. I'm not enough of a mathemagician to
> say how much it's reduced, but it's certainly reduced by a non-zero
> amount.
The best
On Sat, Apr 16, 2011 at 11:00 AM, Peter Pentchev wrote:
> Mine, for instance, is over 30 characters long and, while it is derived
> from a couple of phrases, none of its components would be found by any
> reasonable brute-force or even dictionary attack, even by people who
> know me (please note t
On Fri, Apr 15, 2011 at 11:47:34PM -0700, Todd A. Jacobs wrote:
> Currently, it looks like pinentry-gtk-2 (I'm using 0.8.0) doesn't allow
> pasting from the clipboard. This is annoying, because a truly long,
> randomized password is not practical to type into a hidden dialog box. It
> really seems
I don't have an answer to your question, Todd, but I have to second
your frustration with not being able to paste to the pinentry. I've
never really seen a good justification as to why paste has been
disallowed either so I'd love to see it implemented.
Anthony
On 4/16/11, Todd A. Jacobs wrote:
On 4/14/11 5:02 PM, Felipe Alvarez wrote:
> now, whenever I try to encrypt to user "alice" It fails, saying
> encryption failed: public key not found
>
> The public key is there! But it has a different fingerprint
> (17D11744). GPG is looking for Alice's Old hash fingerprint
> (DE0155B3). How